Results 161 to 170 of about 10,475,631 (365)

“The Pause That Refreshes”: American Servicemen on R&R in Australia, 1967–1971

open access: yesAustralian Journal of Politics &History, EarlyView.
Nearly 10% of the 3 million Americans who served in Vietnam spent one week of “R&R” leave in Australia—principally in Sydney. This “friendly invasion” constitutes a substantial neglected legacy of the conflict. Across dozens of oral history interviews and memoirs, US servicemen recall with fondness their week‐long respite in a nation that was at once ...
Chris Dixon, Jon Piccini
wiley   +1 more source

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Robust Multi-property Combiners for Hash Functions Revisited [PDF]

open access: green, 2008
Marc Fischlin   +2 more
openalex   +1 more source

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 2019
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj  

Home - About - Disclaimer - Privacy